• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2632

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Vulnerability Analysis and Defense for the Internet Abhishek Singh B. Singh H. Joseph 9781441944986 Springer
Vulnerability Analysis and Defense for the Internet

ISBN: 9781441944986 / Angielski / Miękka / 254 str.

ISBN: 9781441944986/Angielski/Miękka/254 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Abhishek Singh; B. Singh; H. Joseph
Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting attacks, SQL injection attacks, format string attacks, buffer overflows, DNS amplification attacks etc. Although these attacks are not new and are well known, the number of vulnerabilities disclosed to the public jumped nearly 5 percent during the first six months of 2007. This accounts to be the fourth year report, which shows the raise in...
Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerabilit...
cena: 403,47 zł

 Towards Sustainable Society on Ubiquitous Networks: The 8th Ifip Conference on E-Business, E-Services, and E-Society (I3e 2008), September 24 - 26, 20 Oya, Makoto 9781441946720 Springer
Towards Sustainable Society on Ubiquitous Networks: The 8th Ifip Conference on E-Business, E-Services, and E-Society (I3e 2008), September 24 - 26, 20

ISBN: 9781441946720 / Angielski / Miękka / 363 str.

ISBN: 9781441946720/Angielski/Miękka/363 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Makoto Oya; Ryuya Uda; Chizuko Yasunobu
The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acquire an - plicable one. Therefore, some techniques such as information filtering have been - troduced to address this issue. Recommender systems filter information that is useful to a user from a large amount of information. Many e-commerce sites use rec- mender systems to filter specific information that users want out of an overload of - formation 2]. For example, Amazon. com is a good example of the success of - commender systems 1]. Over...
The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acq...
cena: 403,47 zł

 Information Security Practice and Experience: 7th International Conference, ISPEC 2011, Guangzhou, China, May 30-June 1, 2011, Proceedings Bao, Feng 9783642210303 Springer
Information Security Practice and Experience: 7th International Conference, ISPEC 2011, Guangzhou, China, May 30-June 1, 2011, Proceedings

ISBN: 9783642210303 / Angielski / Miękka / 448 str.

ISBN: 9783642210303/Angielski/Miękka/448 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Feng Bao; Jian Weng
This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011.
The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.
This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held i...
cena: 201,72 zł

 Finding Services for an Open Architecture: A Review of Existing Applications and Programs in PEO C4I Porche, Isaac R., III 9780833051660 RAND Corporation
Finding Services for an Open Architecture: A Review of Existing Applications and Programs in PEO C4I

ISBN: 9780833051660 / Angielski / Miękka / 44 str.

ISBN: 9780833051660/Angielski/Miękka/44 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
III Isaac R. Porche; James Dryden; Kathryn Connor
The U.S. Navy is moving away from its current stovepiped network system toward one that is service-based and in line with the concept of an open architecture. This report investigates the potential software services within the Program Executive Office, Command, Control, Communications, Computers, and Intelligence that could be used as part of a service-oriented architecture.
The U.S. Navy is moving away from its current stovepiped network system toward one that is service-based and in line with the concept of an open archi...
cena: 74,11 zł

 Transactions on Data Hiding and Multimedia Security VI Yun Q. Shi 9783642245558 Springer-Verlag Berlin and Heidelberg GmbH &
Transactions on Data Hiding and Multimedia Security VI

ISBN: 9783642245558 / Angielski / Miękka / 110 str.

ISBN: 9783642245558/Angielski/Miękka/110 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applica...
cena: 201,72 zł

 The Future of Identity in the Information Society: 4th Ifip Wg 9.2, 9.6, 11.6, 11.7/Fidis International Summer School, Brno, Czech Republic, September Matyás, Vashek 9783642242311 Springer-Verlag Berlin and Heidelberg GmbH &
The Future of Identity in the Information Society: 4th Ifip Wg 9.2, 9.6, 11.6, 11.7/Fidis International Summer School, Brno, Czech Republic, September

ISBN: 9783642242311 / Angielski / Miękka / 283 str.

ISBN: 9783642242311/Angielski/Miękka/283 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vashek Matyas;Simone Fischer-Hubner;Daniel Cvrcek
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the...
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The in...
cena: 403,47 zł

 Open Problems in Network Security: IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers Camenisch, Jan 9783642275845 Springer-Verlag Berlin and Heidelberg GmbH &
Open Problems in Network Security: IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers

ISBN: 9783642275845 / Angielski / Miękka / 160 str.

ISBN: 9783642275845/Angielski/Miękka/160 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Camenisch;Dogan Kesdogan
This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2011, held in Lucerne, Switzerland, in June 2011, co-located and under the auspices of IFIP SEC 2011, the 26th IFIP TC-11 International Information Security Conference. The 12 revised full papers were carefully reviewed and selected from 28 initial submissions; they are fully revised to incorporate reviewers' comments and discussions at the workshop. The volume is organized in topical sections on assisting users, malware detection,...
This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Secur...
cena: 201,72 zł

 Situational Awareness in Computer Network Defense: Principles, Methods and Applications Onwubiko, Cyril 9781466601048 Idea Group,U.S.
Situational Awareness in Computer Network Defense: Principles, Methods and Applications

ISBN: 9781466601048 / Angielski / Twarda / 416 str.

ISBN: 9781466601048/Angielski/Twarda/416 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Cyril Onwubiko;Thomas John Owens
Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous security devices and software such as firewalls, Intrusion Detection Systems (IDS), and Security Information and Event Management (SIEM) to monitor networks in conjunction with Computer Security Incident Response Teams (CSIRT) that are responsible for ensuring availability, integrity, and confidentiality of network services. Situational Awareness in Computer Network Defense: Principles, Methods and Applications provides academia and...
Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous...
cena: 996,68 zł

 Optimizing Information Security and Advancing Privacy Assurance: New Technologies Nemati, Hamid 9781466600263 Idea Group,U.S.
Optimizing Information Security and Advancing Privacy Assurance: New Technologies

ISBN: 9781466600263 / Angielski / Twarda / 340 str.

ISBN: 9781466600263/Angielski/Twarda/340 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hamid Nemati
Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amounts of information online. Optimizing Information Security and Advancing Privacy Assurance: New Technologies reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises. Enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems are discussed in this multidisciplinary collection of research, with the primary...
Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amoun...
cena: 996,68 zł

 Hacking and Securing IOS Applications: Stealing Data, Hijacking Software, and How to Prevent It Zdziarski, Jonathan 9781449318741 O'Reilly Media
Hacking and Securing IOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

ISBN: 9781449318741 / Angielski / Miękka / 358 str.

ISBN: 9781449318741/Angielski/Miękka/358 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jonathan Zdziarski

If you're an app developer with a solid foundation in Objective-C, this book is an absolute must--chances are very high that your company's iOS applications are vulnerable to attack. That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren't aware of.

This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your...

If you're an app developer with a solid foundation in Objective-C, this book is an absolute must--chances are very high that your company's iOS app...

cena: 164,25 zł

 Fundamentals of Communications and Networking Michael G. Solomon 9781449649173 Jones & Bartlett Publishers
Fundamentals of Communications and Networking

ISBN: 9781449649173 / Angielski / Miękka / 488 str.

ISBN: 9781449649173/Angielski/Miękka/488 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael G. Solomon
Networks Have Long Been Regarded As Methods To Connect Resources. While This Is Still That Case, Today'S Networks Are Required To Support An Increasing Array Of Real-Time Communication Methods. Video Chat, Real-Time Messaging, And Always-Connected Resources Put Demands On Networks That Were Previously Unimagined. Fundamentals Of Communications And Networking Helps Readers Understand Today'S Networks And The Way They Support The Evolving Requirements Of Different Types Of Organizations. It Covers The Critical Issues Of Designing A Network That Will Meet An Organization'S Performance Needs And...
Networks Have Long Been Regarded As Methods To Connect Resources. While This Is Still That Case, Today'S Networks Are Required To Support An Increasin...
cena: 544,05 zł

 Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions Gupta, Manish 9781466601970 Information Science Reference
Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions

ISBN: 9781466601970 / Angielski / Twarda / 492 str.

ISBN: 9781466601970/Angielski/Twarda/492 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Manish Gupta; John Walp; Raj Sharman
Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering complexities of a large-scale, distributed IT environments, security should be proactively planned for and prepared ahead, rather than as used as reactions to changes in the landscape. Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions presents high-quality research papers and practice articles on management and governance issues in the field of information security. The main focus of the...
Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering co...
cena: 996,68 zł

 Trusted Systems: Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers Chen, Liqun 9783642252822 Springer
Trusted Systems: Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers

ISBN: 9783642252822 / Angielski / Miękka / 378 str.

ISBN: 9783642252822/Angielski/Miękka/378 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Liqun Chen; Moti Yung
Constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2010. This book features papers that are organized in seven topical sections on implementation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.
Constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2010. This book features papers th...
cena: 201,72 zł

 Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Pa Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina De Capitani di Vimercati 9783642288784 Springer-Verlag Berlin and Heidelberg GmbH &
Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Pa

ISBN: 9783642288784 / Angielski / Miękka / 319 str.

ISBN: 9783642288784/Angielski/Miękka/319 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joaquin Garcia-Alfaro;Guillermo Navarro-Arribas;Nora Cuppens-Boulahia
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based...
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Ma...
cena: 201,72 zł

 Cyber Situational Awareness: Issues and Research Jajodia, Sushil 9781461424758 Springer, Berlin
Cyber Situational Awareness: Issues and Research

ISBN: 9781461424758 / Angielski / Miękka / 252 str.

ISBN: 9781461424758/Angielski/Miękka/252 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the...
Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future res...
cena: 403,47 zł

 Network Intrusion Detection and Prevention: Concepts and Techniques Ghorbani, Ali A. 9781461424741 Springer, Berlin
Network Intrusion Detection and Prevention: Concepts and Techniques

ISBN: 9781461424741 / Angielski / Miękka / 216 str.

ISBN: 9781461424741/Angielski/Miękka/216 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ali A. Ghorbani; Wei Lu; Mahbod Tavallaee

Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems. On the topic of intrusion detection system it is impossible to include everything there is to say on all subjects. However, we have tried to cover the most important and common ones.

...

Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theore...

cena: 564,88 zł

 Privacy Solutions and Security Frameworks in Information Protection Hamid Nemati 9781466620506 Information Science Reference
Privacy Solutions and Security Frameworks in Information Protection

ISBN: 9781466620506 / Angielski / Twarda / 308 str.

ISBN: 9781466620506/Angielski/Twarda/308 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hamid Nemati
While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information. Ensuring the trustworthiness and integrity is important in order for data to be used appropriately. Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional...
While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of t...
cena: 996,68 zł

 The Little Black Book of Computer Security, Second Edition MR Joel Dubin 9781475286243 Createspace
The Little Black Book of Computer Security, Second Edition

ISBN: 9781475286243 / Angielski / Miękka / 212 str.

ISBN: 9781475286243/Angielski/Miękka/212 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
MR Joel Dubin
This is a reprint of The Little Black Book of Computer Security, Second Edition, which is a comprehensive guide for IT security managers. It contains checklists covering all aspects of computer security from network security, to writing security policies, and application security. It also covers the soft skills of security, such as social engineering and best practices for hiring employees and working with auditors.
This is a reprint of The Little Black Book of Computer Security, Second Edition, which is a comprehensive guide for IT security managers. It contains ...
cena: 60,32 zł

 Penetration Testing: Protecting Networks and Systems Henry, Kevin M. 9781849283717 Itgp
Penetration Testing: Protecting Networks and Systems

ISBN: 9781849283717 / Angielski / Miękka / 211 str.

ISBN: 9781849283717/Angielski/Miękka/211 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kevin M. Henry
Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system in the event of a real attack. The Certified Penetration Testing Engineer (CPTE) examination is a widely recognized certification for penetration testers. Penetration Testing: Protecting networks and systems is a preparation guide for the CPTE examination. It describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report. The author's in-the-field experiences,...
Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system...
cena: 161,36 zł

 Wireshark Certified Network Analyst Exam Prep Guide (Second Edition) Laura Chappell 9781893939905 Laura Chappell University
Wireshark Certified Network Analyst Exam Prep Guide (Second Edition)

ISBN: 9781893939905 / Angielski / Miękka / 186 str.

ISBN: 9781893939905/Angielski/Miękka/186 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Laura Chappell
This book is intended to provide practice quiz questions based on the thirty-three areas of study defined for the Wireshark Certified Network Analyst Exam. This Official Exam Prep Guide offers a companion to Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide (Second Edition)."
This book is intended to provide practice quiz questions based on the thirty-three areas of study defined for the Wireshark Certified Network Analyst ...
cena: 221,24 zł

Pierwsza Podprzednia  7  8  9  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia